Sciweavers

1352 search results - page 11 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ICLP
2009
Springer
14 years 8 months ago
Logic Programming for Multiagent Planning with Negotiation
Multiagent planning deals with the problem of generating plans for multiple agents. It requires formalizing ways for the agents to interact and cooperate, in order to achieve their...
Tran Cao Son, Enrico Pontelli, Chiaki Sakama
SAC
2006
ACM
14 years 1 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
13 years 11 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
ICRA
2000
IEEE
165views Robotics» more  ICRA 2000»
13 years 12 months ago
An Approach to Rapid Manufacturing with Custom Fixturing
We present an approach for automatically generating complete process plans, including xturing and CNC code, from high level shape feature part descriptions. The demonstration syst...
Mark Bloomenthal, Richard F. Riesenfeld, Elaine Co...
CHI
2003
ACM
14 years 7 months ago
An hour in the life: towards requirements for modelling multiple task work
It is accepted that changes in technology, work practices and the general socio-economic environment affect the way we plan and perform tasks. Support, opportunity and pressure fo...
Peter J. Wild, Peter Johnson, Hilary Johnson